Manage the risk of privileged access management

“PAM is all about securing the keys to your kingdom,” says Gartner senior director Felix Gaehtgens. “It is one of the most critical security controls to implement.”

Poorly managed privileged access can expose organizations to security breaches and regulatory rebukes, resulting in business losses and financial penalties. Identity and access management (IAM) leaders must effectively manage privileged access in a risk-aware fashion. The right combination of specialized privileged access management (PAM) tools and careful governance can help you improve security and compliance, as well as ensure auditability and accountability.


Recommended sessions on the agenda include:

  • IAM Leaders Guide to PAM
  • Evaluation Criteria for PAM Requirements and Vendor Offerings
  • Leverage Just In Time Approaches to Improve PAM
  • Ask the Expert: Privileged Access Management
  • Tutorial: Managing a Successful PAM Program
  • Lead the Way With Agile for IAM Program Initiatives


Key PAM topics on the agenda include:

  • Integrating multiple identity repositories
  • Automating the identity of privileged users
  • Industry standards for the access governance cycles of privileged users
  • Fundamentals to PAM success
  • How to evolve your PAM maturity
  • What PAM tools are available and when, and how to use them
  • How IaaS platforms (AWS, Microsoft Azure, GCP) manage PAM
  • PAM in DevOps environments
  • Privileged access architectures to improve cybersecurity

 

Gartner Top 10 Security Projects for 2019

PAM is #1 on the list. 

Security and risk management leaders should implement these 10 security projects to address the changing needs of cybersecurity and reduce risk.

Read the full Smarter With Gartner article for tips on the IAM trends for which IT leaders should be prepared.